Title :
Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary
Author :
Peng, Qihang ; Cosman, Pamela C. ; Milstein, Laurence B.
Author_Institution :
Sch. of Commun. & Inf. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fDate :
4/1/2011 12:00:00 AM
Abstract :
The tradeoff between spoofing and jamming a cognitive radio network by an intelligent adversary is analyzed in this paper. Due to the vulnerabilities of spectrum sensing noted in recent studies, a cognitive radio can be attacked during the sensing interval by an adversary who puts spoofing signals in unused bands. Further, once secondary users access unused bands, the adversary can use traditional jamming to interfere with them during transmission. For an energy-constrained intelligent adversary, a two step procedure is formulated to distribute the energy between spoofing and jamming, such that the average sum throughput of the secondary users is minimized. That is, we optimally spoof in the sensing duration and then optimally jam in the transmission slot. In a cluster-based cognitive radio network, when the number of spectral vacancies required by secondary users increases, the optimal attack for the intelligent adversary will shift from jamming only, to a combination of spoofing and jamming, to spoofing only.
Keywords :
cognitive radio; jamming; military communication; radio spectrum management; telecommunication security; cluster-based cognitive radio network; energy-constrained intelligent adversary; jamming; secondary user access; spectrum sensing; spoofing signal; tactical cognitive radio adversary; Cognitive radio; Data communication; Jamming; Joints; Noise; Sensors; Throughput; Cognitive radio; intelligent adversary; partial-band noise jamming; partial-band noise spoofing;
Journal_Title :
Selected Areas in Communications, IEEE Journal on
DOI :
10.1109/JSAC.2011.110420